describing a different problem. We were using two
separate machines that were in different networks.
I do not have enough environment to test today.
I'll test it with a couple of machines tomorrow.
Diego Beltrami wrote:
Hi Kazunori,
thanks for reply.
In your backtrace I see that there are both
Hi,
we have discovered a routing related problem in ESP tunnel and beet mode.
We don't know whether it is a bug in the XFRM, or just in the way the
virtual addresses and the corresponding routes are set-up. We set up a
dummy0 device for the virtual addresses:
[EMAIL PROTECTED]:~# ip addr show
or some IPv4 function should be called between
netif_receive_skb
and ipv6_rcv.
Anyway I could not classify the way to make a panic.
I'll trace it.
Thank you,
Diego Beltrami wrote:
Hi,
we have discovered a routing related problem in ESP tunnel and beet mode.
We don't know whether
Quoting Miika Komu [EMAIL PROTECTED]:
On Tue, 19 Sep 2006, Miika Komu wrote:
Ah, forgot to add new files to version control, sorry. My bad...
The last patch I sent should be fine.
Yes, this patch taken from the mail works just fine.
-
To unsubscribe from this list: send the line
) as specified by the ietf draft at the
following link:
http://www.ietf.org/internet-drafts/draft-nikander-esp-beet-mode-06.txt
Signed-off-by: Diego Beltrami [EMAIL PROTECTED]
Signed-off-by: Miika Komu [EMAIL PROTECTED]
Signed-off-by: Herbert Xu [EMAIL PROTECTED]
Signed-off-by: Abhinav
I suppose that this applies to Dave's netdev git tree?
That would explain why I get lots of patch errors when I try
to apply it to 2.6.18-rc7...
Actually we made the patch against linux/kernel/git/acme/net-2.6.19.git
is that the wrong branch?
--
Diego
-
To unsubscribe from this list: send
Beltrami [EMAIL PROTECTED]
Signed-off-by: Miika Komu [EMAIL PROTECTED]
Signed-off-by: Herbert Xu [EMAIL PROTECTED]
Signed-off-by: Abhinav Pathak [EMAIL PROTECTED]
Signed-off-by: Jeff Ahrenholz [EMAIL PROTECTED]
--
Diego Beltrami
diff --git a/include/linux/in.h b/include/linux/in.h
index bcaca83
addresses, called
inner addresses and outer addresses. The inner addresses are what the
applications see. The outer addresses are what appear on the wire.
The presented BEET mode allows for transformation having inner family equal to
outer family.
Signed-off-by: Diego Beltrami [EMAIL PROTECTED
Quoting Herbert Xu [EMAIL PROTECTED]:
[IPSEC] xfrm: Abstract out encapsulation modes
This patch adds the structure xfrm_mode. It is meant to represent
the operations carried out by transport/tunnel modes.
By doing this we allow additional encapsulation modes to be added
without clogging